메뉴 건너뛰기




Volumn 56, Issue 1, 2016, Pages

Data integrity check based on null space for network coding based cloud storage

Author keywords

Cloud storage; Data integrity; Network coding; Null space

Indexed keywords

CODES (SYMBOLS); DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; VECTOR SPACES;

EID: 84959144694     PISSN: 10000054     EISSN: None     Source Type: Journal    
DOI: 10.16511/j.cnki.qhdxxb.2016.23.002     Document Type: Article
Times cited : (2)

References (15)
  • 1
    • 85077127142 scopus 로고    scopus 로고
    • NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
    • Hu Y, Chen H C H, Lee P P C, et al. NCCloud: Applying network coding for the storage repair in a cloud-of-clouds [C]//USENIX FAST. 2012: 265-272.
    • (2012) USENIX FAST , pp. 265-272
    • Hu, Y.1    Chen, H.C.H.2    Lee, P.P.C.3
  • 2
    • 58349083629 scopus 로고    scopus 로고
    • Privacy-preserving audit and extraction of digital contents
    • HP Labs Technical Report
    • Shah M A, Swaminathan R, Baker M. Privacy-preserving audit and extraction of digital contents, HP Labs Technical Report No. HPL-2008-32 [R]. 2008.
    • (2008)
    • Shah, M.A.1    Swaminathan, R.2    Baker, M.3
  • 5
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Wang C, Wang Q, Ren K, et al. Toward secure and dependable storage services in cloud computing [J]. IEEE Transactions on Services Computing, 2012, 5(2): 220-232.
    • (2012) IEEE Transactions on Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 6
    • 33646057696 scopus 로고    scopus 로고
    • High availability in DHTs: Erasure coding vs. replication
    • Springer Berlin Heidelberg
    • Rodrigues R, Liskov B. High availability in DHTs: Erasure coding vs. replication [M]//Peer-to-Peer Systems IV. Springer Berlin Heidelberg, 2005: 226-239.
    • (2005) Peer-to-Peer Systems IV , pp. 226-239
    • Rodrigues, R.1    Liskov, B.2
  • 11
    • 84959085506 scopus 로고    scopus 로고
    • Auditing for distributed storage systems
    • Cornell University Technical Report
    • Le A, Dimakis A G. Auditing for distributed storage systems, Cornell University Technical Report [R/OL]. http://arxiv.org/abs/1203.1730.
    • Le, A.1    Dimakis, A.G.2
  • 12
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • San Diego, CA: IEEE
    • Wang C, Wang Q, Ren K, et al. Privacy-preserving public auditing for data storage security in cloud computing [C]//INFOCOM, 2010 Proceedings IEEE. San Diego, CA: IEEE, 2010.
    • (2010) INFOCOM, 2010 Proceedings IEEE
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 13
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA: IEEE
    • Yu S C, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [C]//INFOCOM, 2010 Proceedings IEEE. San Diego, CA: IEEE, 2010.
    • (2010) INFOCOM, 2010 Proceedings IEEE
    • Yu, S.C.1    Wang, C.2    Ren, K.3
  • 15
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • IEEE
    • Elias K, Li B C. Null keys: Limiting malicious attacks via null space properties of network coding [C]//INFOCOM, 2009 Proceedings IEEE. IEEE, 2009: 1224-1232.
    • (2009) INFOCOM, 2009 Proceedings IEEE , pp. 1224-1232
    • Elias, K.1    Li, B.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.